网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following would an attacker use to footprint a system?()
A

RADIUS

B

Password cracker

C

Port scanner

D

Man-in-the-middle attack


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following would an attacker use to footprint a system?()A RADIUSB Password crackerC Port scannerD Man-in-the-middle attack” 相关考题
考题 Which of the following utilities would a technician use to prevent a service from starting duringsystem startup?() A. Event ViewerB. System File CheckerC. MSCONFIGD. Task Manager

考题 A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?() A. Remove the BIOS chip on the PCB. Re-flash the BIOSC. Run password cracking software on the users PCD. Set the password clear jumper on the motherboard

考题 A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?() A.StraightB.ConsoleC.CrossoverD.Loopback

考题 Which of the following monitors a server to see which protocols might be in use?() A. Ping sweepB. Intrusion detection softwareC. Port scannerD. Wireless packet sniffer

考题 A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()A、StraightB、ConsoleC、CrossoverD、Loopback

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

考题 Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()A、startcondrespB、filemonC、lsfsD、mount

考题 Which of the following monitors a server to see which protocols might be in use?()A、Ping sweepB、Intrusion detection softwareC、Port scannerD、Wireless packet sniffer

考题 Which two statements about common network attacks are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.C、Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.D、Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.E、Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.F、Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

考题 Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack

考题 Which of the following would an attacker use to footprint a system?()A、RADIUSB、Password crackerC、Port scannerD、Man-in-the-middle attack

考题 Which of the following locations would a technician use to add a Windows 7 computer to adomain?()A、System PropertiesB、Windows DefenderC、Network and Sharing CenterD、Device Manager

考题 A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()A、Remove the BIOS chip on the PCB、Re-flash the BIOSC、Run password cracking software on the users PCD、Set the password clear jumper on the motherboard

考题 Which of the following is the LEAST intrusive way of checking the environment for known software flaws?()A、Protocol analyzerB、Vulnerability scannerC、Port scannerD、Penetration test

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A、User ID/password fileB、Communications layerC、Client applicationsD、Operating system

考题 Which of the following commands would a system administrator use to initiate a rescan of the /etc/inittab file()A、telinit -qB、init -rC、initab -sD、exec /etc/inittab

考题 Which of the following commands would an administrator use to add startup scripts to the system startup process()A、chitabB、vi /etc/inittabC、vi /etc/rc.dD、mkitab

考题 An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A、DoSB、SYN floodC、port scanningD、IP address sweep

考题 单选题Which of the following commands would a system administrator use to initiate a rescan of the /etc/inittab file()A telinit -qB init -rC initab -sD exec /etc/inittab

考题 单选题An attacker sends a low rate of TCP SYN segments to hosts, hoping that at least one port replies. Which type of an attack does this scenario describe?()A DoSB SYN floodC port scanningD IP address sweep

考题 单选题Which of the following commands would an administrator use to add startup scripts to the system startup process()A chitabB vi /etc/inittabC vi /etc/rc.dD mkitab

考题 单选题Which of the following commands would a system administrator use to automate monitoring and notification of filling filesystems ()A startcondrespB filemonC lsfsD mount

考题 单选题A technician needs to manage a switch by using the management port on the back of the switch.Which of the following cables would the technician use?()A StraightB ConsoleC CrossoverD Loopback

考题 单选题A "trusted" client needs to communicate with a server that has been configured to use CLIENT authentication. Which of the following will be used to verify passwords?()A User ID/password fileB Communications layerC Client applicationsD Operating system

考题 单选题Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A Network layer firewallB Stateful inspection firewallC Zone aware firewallD Application layer firewall

考题 单选题A user has forgotten their BIOS password on their computer. Which of the following would atechnician use to allow the user access to their PC?()A Remove the BIOS chip on the PCB Re-flash the BIOSC Run password cracking software on the users PCD Set the password clear jumper on the motherboard